An Efficient Two-Stage Network Intrusion Detection System in the Internet of Things

Author:

Zhang Hongpo12ORCID,Zhang Bo1ORCID,Huang Lulu2ORCID,Zhang Zhaozhe1ORCID,Huang Haizhaoyang1ORCID

Affiliation:

1. School of Cyber Science and Engineering, Zhengzhou University, Zhengzhou 450001, China

2. Cooperative Innovation Center of Internet Healthcare, Zhengzhou University, Zhengzhou 450001, China

Abstract

Internet of Things (IoT) devices and services provide convenience but face serious security threats. The network intrusion detection system is vital in ensuring the security of the IoT environment. In the IoT environment, we propose a novel two-stage intrusion detection model that combines machine learning and deep learning to deal with the class imbalance of network traffic data and achieve fine-grained intrusion detection on large-scale flow data. The superiority of the model is verified on the newer and larger CSE-CIC-IDS2018 dataset. In Stage-1, the LightGBM algorithm recognizes normal and abnormal network traffic data and compares six classic machine learning techniques. In Stage-2, the Convolutional Neural Network (CNN) performs fine-grained attack class detection on the samples predicted to be abnormal in Stage-1. The Stage-2 multiclass classification achieves a detection rate of 99.896%, F1score of 99.862%, and an MCC of 95.922%. The total training time of the two-stage model is 74.876 s. The detection time of a sample is 0.0172 milliseconds. Moreover, we set up an optional Synthetic Minority Over-sampling Technique based on the imbalance ratio (IR-SMOTE) of the dataset in Stage-2. Experimental results show that, compared with SMOTE technology, the two-stage intrusion detection model can adapt to imbalanced datasets well and reveal higher efficiency and better performance when processing large-scale flow data, outperforming state-of-the-art intrusion detection systems.

Funder

Key R&D and promotion projects of Henan Province

Publisher

MDPI AG

Subject

Information Systems

Reference42 articles.

1. The internet of things: A survey;Atzori;Comput. Netw.,2010

2. A visualized botnet detection system based deep learning for the internet of things networks of smart cities;Vinayakumar;IEEE Trans. Ind. Appl.,2020

3. MTHAEL: Cross-architecture IoT malware detection based on neural network advanced ensemble learning;Vasan;IEEE Trans. Comput.,2020

4. Rehman, A., Paul, A., Yaqub, M.A., and Rathore, M.M.U. (April, January 30). Trustworthy Intelligent Industrial Monitoring Architecture for Early Event Detection by Exploiting Social IoT. Proceedings of the 35th Annual ACM Symposium on Applied Computing, SAC ’20, Virtual.

5. Liu, H., and Lang, B. (2019). Machine learning and deep learning methods for intrusion detection systems: A survey. Appl. Sci., 9.

Cited by 10 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3